Articles about Privacy
The personal details of the world's G20 leaders were accidentally emailed to the organisers of the Asian Cup by a staff member of the Department of Immigration and Border Protection, which chose to avoid notifying the leaders.
The airline has confirmed thousands of frequent flyer accounts have been accessed.
US coding website GitHub is fending off a DDoS onslaught focused on shutting down anticensorship tools.
The conditions are ripe for businesses and services to do away with wanting to get their hands on as much of their users' information as possible.
The floodgates are now open for UK users to sue Google over privacy violations caused by tracking cookies.
Security and privacy were top issues in 2014, and so Tech Pro Research conducted a survey to find out what companies are planning for 2015. Now more than ever, security and privacy protections are of paramount...
from TechProResearch »
The Australian privacy commissioner has accepted an enforceable undertaking from Optus after investigating three separate privacy breaches at the telco.
Following Labor and the government teaming up to pass mandatory data-retention legislation in the Senate on Thursday night, Telstra has announced plans to store the encrypted data in Australia.
On the financial side of the spectrum, Yahoo's board also approved a new multi-billion stock buyback program.
The government and Labor have jointly ensured that the telecommunications data of all Australians will be retained for two years for warrantless access by law-enforcement agencies.
New Zealand's inspector-general of intelligence and security is launching an inquiry into allegations that the Government Communications Security Bureau intercepted the communications of New Zealanders in the South Pacific.
Australian Attorney-General George Brandis has reiterated claims that the data-retention Bill does not force service providers to retain data that, as an industry, they do not already collect.
Attorney-General George Brandis has revealed that the estimated average cost for storing telecommunications data will be close to AU$4 per customer, per year.
The Australian Greens have announced a set of amendments that would force law-enforcement agencies to obtain warrants for all access requests for stored telecommunications data, and has proposed limiting the data being held to just three months.
Australian Communications Minister Malcolm Turnbull has said that the vast majority of metadata queries used by police are to determine who the account holder of a phone is.
It's a scared new world, where all Australians are tracked for two years on the off chance that they turn bad.
Follow these simple tips to make protecting your identity easier.
There are a lot of players in the mandatory data-retention debate. We look at who is for the legislation, and who is opposing it.
Your home router is vulnerable to attacks as soon as you take it out of the box. Here are a number of ways you can secure your home wireless network.
When a person passes away, their social account can become a memorial of their life, friendships and experiences. See step-by-step instructions for selecting your legacy contact.
From encrypted instant messengers to secure browsers and operating systems, these privacy-enhancing apps, extensions, and services can protect you both online and offline.
A look back at the hot topics, major deals, and the technological breakthroughs of 2014 -- from security to product launches, and the year's successes and catastrophes.
Apps running in mobile operating systems must get permission from the user for all sorts of things. This can be confusing. Do some do it better than others?
How do you vanish online? Follow these 10 steps to get started.
The new Apple software and new hardware for it have many features that could present problems for enterprises if IT doesn't prepare.
My Amazon home page shows me how much the company knows about me and my online activities. Here we show you which privacy and security settings can help you reduce the information Amazon holds about you.
Have you ever wondered how social networking sites seem to know so much about you and your preferences? We take the lid off how these sites gather data about your activities.
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
Maintaining privacy online seems almost impossible, but there are a tools that can minimise the chances of your personal, financial or business data falling into the wrong hands.
How much do you love your country? Enough to shop until you drop, choosing just the right gifts? If you're stumped on exactly what to give your favorite nation, we have the answers. Come on in!
Welcome to the official 2013 edition of our ZDNet DIY-IT Gift Guide. This year, in honor of 2013, we present to you 14 interesting and useful products that the DIY-ITer in your life will find particularly useful, fun, or cool.
If you think the government cannot and does not want to get its hands all over your personal data, then think again.
At the Where 2.0 conference in San Jose, Calif., Deborah Estrin, a professor of computer science at UCLA, says the capability of GPS mobile phones to record location over time creates a new wealth of analytics. For example, new opportunities will exist where information is gathered from multiple users that better enables the accuracy of local traffic conditions.
There are no privacy issues with Google Street View, a Maps-based project that offers 360-degree panoramic views of various streets in cities around the US, according to Google Australia's head of engineering. At the Google developer day in Sydney last week, Lars Rasmussen denied that privacy was an issue when it came to Google Street View because, he said, the images are all taken in "public areas".
The success of the proposed Access Card rests on how the private sector puts it to use, according to Australian Federal Police (AFP) Commissioner Mick Keelty.Keelty believes the private sector may use the Access Card as a general ID card when its real purpose was to ensure that the "right people" receive access to needed government services such as Medicare.
Chertoff, secretary of the U.S. Department of Homeland Security, appears at the opening of the Joint Regional Intelligence Center in Norwalk, Calif., on Friday, Aug. 18, saying that his department is indeed concerned with privacy. The intelligence center joins federal, state and local law enforcement in one facility as part of a post-9/11 effort to improve law enforcement collaboration.
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.
ZoneAlarm Security Suite puts Norton Internet Security and McAfee Internet Security to shame with its easy-to-use features.ZoneAlarm's Security Suite is one of the best security suites we've seen.
A well-designed program, Spy Sweeper is both classy and effective.Webroot Spy Sweeper 2.